Sicherheitslücke Mensch

Wenn herkömmliche Cyberangriffe an ihre Grenzen stoßen, greifen Hacker auf Social Engineering zurück. Durch die gezielte Manipulation von Mitarbeitern entstehen jährlich Schäden in Milliardenhöhe. Dabei können IT-Manager bereits mit einfachen Methoden das Risiko minimieren.

Quelle: Sicherheitslücke Mensch

Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines

For many of us the term data breach conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate the more likely we are to shift focus from outsider hackers to insider threats.

Quelle: Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents. When it comes to automation, security platforms will devise and execute controls based on newly detected threats and do it without human intervention. That reduces the time between a compromise and the time the threat is neutralized – reducing the time window when attackers can do damage.

Quelle: The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence